CVE-2023-53678
BaseFortify
Publication date: 2025-10-07
Last updated on: 2026-02-26
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | From 6.2 (inc) to 6.2.5 (inc) |
| intel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's drm/i915 driver related to system suspend operations. Specifically, if the framebuffer device (fbdev) is not initializedβcommonly on platforms without a displayβthe system suspend process attempts to suspend fbdev anyway, leading to a NULL pointer dereference and a kernel crash. The fix ensures that suspending fbdev is skipped if it is not initialized and adds an assertion that fbdev suspension only happens when a display is present.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to crash during system suspend on platforms where the framebuffer device is not initialized. This can lead to system instability, unexpected reboots, or inability to properly suspend the system, potentially affecting availability and reliability of the affected system.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by observing system logs for kernel oops or NULL pointer dereference errors related to drm/i915 during system suspend. You can check the kernel log using commands like 'dmesg | grep -i i915' or 'journalctl -k | grep -i i915' to look for error messages similar to those described in the vulnerability, such as 'BUG: kernel NULL pointer dereference' during suspend.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version that includes the fix for this vulnerability, which addresses the issue of suspending fbdev without it being initialized. Until the update is applied, avoid suspending systems that may trigger this bug, especially on platforms without a display.